I feel like I'm sooo close yet so far. I'm trying to avoid using a Domain
controller at all, and just setting up authentication at windows login to
authenticate against my already existing linux KDC. I have setup the machine
password, user mappings, realm setting, etc. on the Windows Machines (1
Jin Zhou <[EMAIL PROTECTED]> writes:
> Message-ID: <[EMAIL PROTECTED]>
> Date: Mon, 17 Dec 2001 20:01:02 -0800
> From: Jin Zhou <[EMAIL PROTECTED]>
> To: [EMAIL PROTECTED], [EMAIL PROTECTED]
> Subject: Bug with Kerberos 1.2.2 for 64 bit HPUX 11 !?
>
> Hi:
>
> I compiled Kerberos 1.2.2 on HPU
Hi:
I compiled Kerberos 1.2.2 on HPUX 11.00 with "+DD64" flag passed to
cc compiler, which means all
the binaries will be in 64 bit format.
Everything so far works fine except for /usr/local/sbin/kadmin. Here
is what happens when I run kadmin
trying to connect to a kadmind & krb5kdc runn
> "mdw" == Marcus Watts <[EMAIL PROTECTED]> writes:
mdw> "Mayers, Philip J" <[EMAIL PROTECTED]> writes:
>> poly = 0xEDB88320L
Hm. I thought this seemed wrong, but it turns out to be
bit-reversal... The ISO-3309 32-bit FCS polynomial is 0x4c11db7,
assuming that the MSB corresponds to the hi
http://www.nrl.navy.mil/CCS/people/kenh/kerberos-faq.html#namefrom
Hi;
I've taken over a new RH71 box and I'm working with kerberos for the first
time. I've run into a strange problem (see below) that I haven't been able
to figure out so I thought I'd rebuild from source to be able to run make
check, etc. But if I do this I'm going to have to rpm -e certain rp
Ok, my employer is looking for a document that compares MIT kerberos to
the Heimdal implementation of Kerberos. Does anyone know of the existence
of such a thing? If so, please drop me a line. I have yet to find anything
and dont particularly care to do one myself. ;)
Thanks
-ray
--
Red Hat took it out of their 7.2 documentation for some reason, but
their 7.1 guide had a good HOWTO that is still entirely applicable.
http://www.redhat.com/docs/manuals/linux/RHL-7.1-Manual/ref-guide/s1-kerberos-server.html
Jason
Josef Allen wrote:
> Does some one have a howto on configurin
Hi all.
Could it be that the guys at MIT chose the name Kerberos because there are
three Parties involved in the authentication process (client, server, krb)
and Kerberos (the beast) is commonly visualized as a three headed dog?
Is there any anecdote out there which referes to this topic? Or was
In article <3c1e590c$0$19995$[EMAIL PROTECTED]>,
Heiko Hund <[EMAIL PROTECTED]> wrote:
>Could it be that the guys at MIT chose the name Kerberos because there are
>three Parties involved in the authentication process
No. The name ``Kerberos'' was originally conceived when the project
was still
> Could it be that the guys at MIT chose the name Kerberos because there are
> three Parties involved in the authentication process (client, server, krb)
> and Kerberos (the beast) is commonly visualized as a three headed dog?
Actually, there are two reasons. First, it fits in with the project n
I recommend that you search through the pam-krb5 list archives:
http://lists.netexpress.net/pipermail/pam-krb5/
You can use Sun's SEAM, and/or MIT krb5 w/ one of the various
open-source pam_krb5 modules. And you can use OpenSSH w/ Simon
Wilkinson's SSH/GSS-API patches[*].
[*] http://www.sxw.org
Hi All,
I'm looking for any help anyone would like to offer.
Where I work we have switched over from a Windows NT 4 domain
to a Windows 2000 domain with Active Directory. In addition to
the various Windows based servers we have, we also have
approximately 10 Sun boxes running different versions
> "Ben" == Ben Ocean <[EMAIL PROTECTED]> writes:
Ben> #/usr/kerberos/sbin/kadmin.local Authenticating as principal
Ben> [EMAIL PROTECTED] with password.
Accessing the KDC on localhost...
Ben> kadmin.local: q #/usr/kerberos/sbin/kadmin Authenticating as
Ben> principal [EMAIL
15 matches
Mail list logo